Sciweavers

210 search results - page 16 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
15 years 12 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
ICDM
2005
IEEE
139views Data Mining» more  ICDM 2005»
15 years 5 months ago
Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation
In order to generate synthetic basket data sets for better benchmark testing, it is important to integrate characteristics from real-life databases into the synthetic basket data ...
Yongge Wang, Xintao Wu
CIKM
2009
Springer
15 years 6 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
ICFEM
2009
Springer
15 years 6 months ago
Symbolic Query Exploration
Abstract. We study the problem of generating a database and parameters for a given parameterized SQL query satisfying a given test condition. We introduce a formal background theor...
Margus Veanes, Pavel Grigorenko, Peli de Halleux, ...
ICDE
2010
IEEE
276views Database» more  ICDE 2010»
15 years 6 months ago
X-data: Generating test data for killing SQL mutants
Abstract— Checking if an SQL query has been written correctly is not an easy task. Formal verification is not applicable, since it is based on comparing a specification with an...
Bhanu Pratap Gupta, Devang Vira, S. Sudarshan